Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-88qg-f543-x242

Опубликовано: 07 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 10

Описание

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

EPSS

Процентиль: 51%
0.00278
Низкий

10 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 10
ubuntu
5 месяцев назад

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

CVSS3: 10
redhat
6 месяцев назад

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

CVSS3: 10
nvd
5 месяцев назад

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

CVSS3: 10
debian
5 месяцев назад

A flaw was found in Samba, in the front-end WINS hook handling: NetBIO ...

CVSS3: 10
fstec
6 месяцев назад

Уязвимость реализации сервера разрешения имён WINS пакета программ сетевого взаимодействия Samba, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 51%
0.00278
Низкий

10 Critical

CVSS3

Дефекты

CWE-78